Article Details
Scrape Timestamp (UTC): 2024-11-20 16:49:05.820
Original Article Text
Click to Toggle View
New Ghost Tap attack abuses NFC mobile payments to steal money. Cybercriminals have devised a novel method to cash out from stolen credit card details linked to mobile payment systems such as Apple Pay and Google Pay, dubbed 'Ghost Tap,' which relays NFC card data to money mules worldwide. The tactic builds upon the methods previously deployed by mobile malware like NGate, documented by ESET in August, which involved relaying Near Field Communication (NFC) signals from payment cards. Ghost Tap is more obfuscated and more challenging to detect, does not require the card or the victim's device, doesn't need continual victim interchange, and involves money mules on multiple remote locations interacting with Point of Sale (PoS) terminals. Mobile security firm Threat Fabric discovered Ghost Tap, which warns about the increasing adoption and potential of the new tactic, telling BleepingComputer it has recently seen a spike in using this tactic in the wild. Ghost Tap overview and comparison to NGate The first step in the attack is to steal the data of payment cards and intercept the one-time passwords (OTP) needed for virtual wallet enrollment on Apple Pay and Google Pay. Stealing the payment card data can be accomplished through banking malware that displays overlays that mimic digital payment apps or through phishing pages and keylogging. OTPs can be stolen through social engineering or by malware that monitors text messages. In the previous NGate-based attacks, the victim needed to be tricked into scanning their card using their device's NFC system using specialized malware that guided them through this process. The NFCGate tool is still used to relay payment card information. However, a relay server is placed in between now, sending the details to an extensive network of money mules while obfuscating their actual locations. The mules then perform retail purchases at scale and multiple locations using their device's NFC chip, making it hard to map the fraud network or trace the primary attacker. In the NGate attacks, the threat actors were limited to small contactless payments and ATM withdrawals that risked their anonymity and even led to arrests in some cases. With the new Ghost Taps operation, the threat actors no longer conduct ATM withdrawals. Instead, they only conduct point-of-sale cash outs and spread them among a wide network of mules worldwide. This obfuscates the trail to the main operators of the malicious activity, only putting the mules at risk. Protecting against Ghost Tap Threat Fabric warns that the new tactic is challenging for financial institutions to detect and stop as the transactions appear legitimate and span multiple locations. While many bank's anti-fraud mechanisms detect purchases from unusual locations, such as when traveling to another country, the researchers say the numerous small payments may bypass these detections. "The new tactic for cash-outs poses a challenge for financial organisations: the ability of cybercriminals to scale the fraudulent offline purchases, making multiple small payments in different places, might not trigger the anti-fraud mechanisms and might allow cybercriminals to successfully buy goods that can be further re-sold (like gift cards)," explains ThreatFabric. Even with all these small transactions appearing to come from a single device (tied to the same Apple Pay/Google Pay account), the total amount lost can be significant if the attack is applied at scale. To evade tracking, the mules put their devices in "airplane mode," which still allows the NFC system to function as usual. The only way to defend against Ghost Tap is for banks to flag transactions made from the same card but at locations that are not physically possible to get to in the timeframe between charges. For example, conducting a fraudulent transaction in New York and then ten minutes later, performing one in Cyprus. From the consumer's perspective, monitoring for fraudulent transactions and reporting them to your bank immediately is crucial for blocking the card and minimizing the losses.
Daily Brief Summary
Cybercriminals have developed 'Ghost Tap,' utilizing stolen credit card details through NFC to conduct fraudulent transactions worldwide without needing the physical card or device.
Ghost Tap builds on earlier mobile malware techniques but with advanced obfuscation and does not require continuous interaction with the victim, making detection harder.
The method involves intercepting OTPs for mobile payment enrollment and using money mules who unknowingly conduct transactions at PoS terminals.
Unlike previous tactics, Ghost Tap avoids ATMs, opting for retail purchases across a distributed network of mules, thus complicating tracking efforts and reducing risk to the primary fraud operators.
Financial institutions struggle to detect these frauds as they mimic legitimate transaction patterns across various locations, often bypassing traditional anti-fraud systems.
Threat Fabric suggests that the only effective countermeasure may be flagging transactions that are geographically improbable within short time frames.
Consumers are advised to monitor their accounts closely for any unauthorized transactions and report them promptly to minimize potential losses.